Large-Scale Logic-Locking Attacks via Simulation

被引:1
|
作者
Purdy, Ruben [1 ]
Blanton, R. D. Shawn [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15232 USA
来源
PROCEEDINGS OF THE TWENTY THIRD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2022) | 2022年
关键词
Hardware Security; Logic Locking; Obfuscation;
D O I
10.1109/ISQED54688.2022.9806265
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Because IC security has become an increasingly prevalent issue for hardware designers, a number of IC protection schemes have been introduced in the literature. One such scheme, logic locking, involves transforming a hardware design so that it will not operate correctly unless extra inputs (called key inputs) are driven to specific values that are secret. Many existing logic-locking solutions are vulnerable to attacks that uncover the key-input values necessary for correct operation. However, the success of such attacks wane as the size of the design and the number of key inputs increases. In this work, we introduce a logic-locking attack which uses circuit simulators to determine key-input values from large-scale circuits with thousands of added key inputs. Attacks performed on such designs demonstrate the effectiveness of this approach in comparison to other attacks.
引用
收藏
页码:352 / 357
页数:6
相关论文
共 41 条
  • [21] Deceptive Logic Locking for Hardware Integrity Protection Against Machine Learning Attacks
    Sisejkovic, Dominik
    Merchant, Farhad
    Reimann, Lennart M.
    Leupers, Rainer
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (06) : 1716 - 1729
  • [22] Oracle-based Logic Locking Attacks: Protect the Oracle Not Only the Netlist
    Kalligeros, Emmanouil
    Karousos, Nikolaos
    Karybali, Irene G.
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 939 - 944
  • [23] UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking
    Alrahis, Lilas
    Patnaik, Satwik
    Knechtel, Johann
    Saleh, Hani
    Mohammad, Baker
    Al-Qutayri, Mahmoud
    Sinanoglu, Ozgur
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2508 - 2523
  • [24] Thwarting GNN-Based Attacks Against Logic Locking
    Darjani, Armin
    Kavand, Nima
    Rai, Shubham
    Kumar, Akash
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7200 - 7215
  • [25] Discerning Limitations of GNN-based Attacks on Logic Locking
    Darjani, Armin
    Kavand, Nima
    Rai, Shubham
    Kumar, Akash
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [26] DK Lock: Dual Key Logic Locking Against Oracle-Guided Attacks
    Maynard, Jordan
    Rezaei, Amin
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 252 - 258
  • [27] ATPG-Guided Fault Injection Attacks on Logic Locking
    Jain, Ayush
    Rahman, M. Tanjidur
    Guin, Ujjwal
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL CONFERENCE ON PHYSICAL ASSURANCE AND INSPECTION ON ELECTRONICS (PAINE), 2020,
  • [28] Logic Locking With Provable Security Against Power Analysis Attacks
    Sengupta, Abhrajit
    Mazumdar, Bodhisatwa
    Yasin, Muhammad
    Sinanoglu, Ozgur
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (04) : 766 - 778
  • [29] SimLL: Similarity-Based Logic Locking Against Machine Learning Attacks
    Chowdhury, Subhajit Dutta
    Yang, Kaixin
    Nuzzo, Pierluigi
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [30] A Lightweight Robust Logic Locking Technique to Thwart Sensitization and Cone-Based Attacks
    Rathor, Vijaypal Singh
    Sharma, G. K.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 811 - 822